메뉴 건너뛰기




Volumn 11, Issue 7, 2010, Pages 394-413

Understanding security behaviors in personal computer usage: A threat avoidance perspective

Author keywords

Avoidance; Home setting; Motivation; Safeguarding measure; Security; Severity; Susceptibility; Threat

Indexed keywords

NETWORK SECURITY; PERSONAL COMPUTERS;

EID: 77955121478     PISSN: 15583457     EISSN: 15369323     Source Type: Journal    
DOI: 10.17705/1jais.00232     Document Type: Article
Times cited : (427)

References (75)
  • 1
    • 0034557459 scopus 로고    scopus 로고
    • Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment
    • Agarwal, R., V. Sambamurthy, and R. M. Stair (2000) Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment, Information Systems Research (11) 4, pp. 418-430.
    • (2000) Information Systems Research , vol.4 , Issue.11 , pp. 418-430
    • Agarwal, R.1    Sambamurthy, V.2    Stair, R.M.3
  • 2
    • 58149324506 scopus 로고
    • Statistical power problems with moderated multiple regression in management research
    • Aguinis, H. (1995) Statistical power problems with moderated multiple regression in management research, Journal of Management (21) 6, pp. 1141-1158.
    • (1995) Journal of Management , vol.6 , Issue.21 , pp. 1141-1158
    • Aguinis, H.1
  • 6
    • 77955115473 scopus 로고    scopus 로고
    • Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions
    • Milwaukee, WI
    • Anderson, C. L. and R. Agarwal (2006) Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions, in International Conference on Information Systems, pp. 1543-1561. Milwaukee, WI.
    • (2006) International Conference On Information Systems , pp. 1543-1561
    • Anderson, C.L.1    Agarwal, R.2
  • 7
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K. and C. Terry (2004) Computer security and risky computing practices: A rational choice perspective, Journal of Organizational and End User Computing (16) 3, pp. 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.3 , Issue.16 , pp. 22-40
    • Aytes, K.1    Terry, C.2
  • 8
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and internet security breaches
    • Bagchi, K. and G. Udo (2003) An analysis of the growth of computer and internet security breaches, Communications of the AIS (12), pp. 684-700.
    • (2003) Communications of The AIS , Issue.12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 9
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavior change
    • Bandura, A. (1977) Self-efficacy: Toward a unifying theory of behavior change, Psychological Review (84). 191-215.
    • (1977) Psychological Review , Issue.84 , pp. 191-215
    • Bandura, A.1
  • 10
    • 33746878674 scopus 로고
    • Self-efficacy mechanism in human agency
    • Bandura, A. (1982) Self-efficacy mechanism in human agency, American Psychologist 37, pp. 122-147.
    • (1982) American Psychologist , vol.37 , pp. 122-147
    • Bandura, A.1
  • 11
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R. and D. Kenny (1986) The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations, J Person Soc Psych (51) 6, pp. 1173-1182.
    • (1986) J Person Soc Psych , vol.6 , Issue.51 , pp. 1173-1182
    • Baron, R.1    Kenny, D.2
  • 12
    • 0026398826 scopus 로고
    • Risk analysis as a source of professional knowledge
    • Baskerville, R. (1991) Risk analysis as a source of professional knowledge, Computer & Security (10) 8, pp. 749-764.
    • (1991) Computer & Security , vol.8 , Issue.10 , pp. 749-764
    • Baskerville, R.1
  • 13
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • Baskerville, R. (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security, European Journal of Information Systems (1) 2, pp. 121-130.
    • (1991) European Journal of Information Systems , vol.2 , Issue.1 , pp. 121-130
    • Baskerville, R.1
  • 14
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993) Information systems security design methods: implications for information systems development, ACM Computing Surveys (25) 4, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.4 , Issue.25 , pp. 375-414
    • Baskerville, R.1
  • 15
    • 33645301638 scopus 로고    scopus 로고
    • Understanding user responses to information technology: A coping model of user adaptation
    • Beaudry, A. and A. Pinsonneault (2005) Understanding user responses to information technology: A coping model of user adaptation, MIS Quarterly (29) 3, pp. 493-524.
    • (2005) MIS Quarterly , vol.3 , Issue.29 , pp. 493-524
    • Beaudry, A.1    Pinsonneault, A.2
  • 16
    • 0000937373 scopus 로고
    • On theory, statistics, and the search for interactions in the organizational sciences
    • Bobko, P. and C. J. Russell (1994) On theory, statistics, and the search for interactions in the organizational sciences, Journal of Management (20), pp. 193-200.
    • (1994) Journal of Management , Issue.20 , pp. 193-200
    • Bobko, P.1    Russell, C.J.2
  • 17
    • 2942675541 scopus 로고    scopus 로고
    • In Pursuit of Moderation: Nine Common Errors and Their Solutions
    • Carte, T. and C. Russell (2003) In Pursuit of Moderation: Nine Common Errors and Their Solutions, MIS Quarterly (27) 3, pp. 479-501.
    • (2003) MIS Quarterly , vol.3 , Issue.27 , pp. 479-501
    • Carte, T.1    Russell, C.2
  • 18
    • 0020157678 scopus 로고
    • Control theory: A useful conceptual framework for personalitysocial, clinical, and health psychology
    • Carver, C. S. and M. F. Scheier (1982) Control theory: A useful conceptual framework for personalitysocial, clinical, and health psychology, Psychological Bulletin (92) 1, pp. 111-135.
    • (1982) Psychological Bulletin , vol.1 , pp. 111-135
    • Carver, C.S.1    Scheier, M.F.2
  • 19
    • 0031261428 scopus 로고    scopus 로고
    • Reliability and validity of breast cancer screening belief scales in African American women
    • Champion, V. and C. Scott (1997) Reliability and validity of breast cancer screening belief scales in African American women, Nursing Research (46) 6, pp. 331-337.
    • (1997) Nursing Research , vol.6 , Issue.46 , pp. 331-337
    • Champion, V.1    Scott, C.2
  • 20
    • 0344527939 scopus 로고    scopus 로고
    • Influence of computer attitude and self-efficacy on IT usage behavior
    • Chau, P. Y. K. (2001) Influence of computer attitude and self-efficacy on IT usage behavior, Journal of End User Computing (13) 1, pp. 26.
    • (2001) Journal of End User Computing , vol.1 , Issue.13 , pp. 26
    • Chau, P.Y.K.1
  • 21
    • 0042242856 scopus 로고    scopus 로고
    • A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study
    • Chin, W. W., B. L. Marcolin, and P. R. Newsted (2003) A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study, Information Systems Research (14) 2, pp. 189-217.
    • (2003) Information Systems Research , vol.2 , Issue.14 , pp. 189-217
    • Chin, W.W.1    Marcolin, B.L.2    Newsted, P.R.3
  • 23
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measue and initial test
    • Compeau, D. R. and C. A. Higgins (1995) Computer self-efficacy: development of a measue and initial test, MIS Quarterly (19), pp. 189-211.
    • (1995) MIS Quarterly , Issue.19 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 24
    • 0000004470 scopus 로고    scopus 로고
    • Social cognitive theory and individual reactions to computing technology: A longitudinal study
    • Compeau, D. R., C. A. Higgins, and S. Huff (1999) Social cognitive theory and individual reactions to computing technology: a longitudinal study, MIS Quarterly (23) 2, pp. 145-158.
    • (1999) MIS Quarterly , vol.2 , Issue.23 , pp. 145-158
    • Compeau, D.R.1    Higgins, C.A.2    Huff, S.3
  • 25
    • 85080719040 scopus 로고    scopus 로고
    • Consumer Reports., Consumer Reports National Research Center
    • Consumer Reports. (2009) State of the Net 2009. Consumer Reports National Research Center.
    • (2009) State of The Net 2009
  • 26
    • 33748435812 scopus 로고    scopus 로고
    • CSI, Computer Security Institute
    • CSI. (2009) Computer crime & security survey 2009. Computer Security Institute.
    • (2009) Computer Crime & Security Survey
  • 27
    • 67649551429 scopus 로고    scopus 로고
    • User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    • D'Arcy, J., A. Hovav, and D. F. Galletta (2009) User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research (20) 1, pp. 79-98.
    • (2009) Information Systems Research , vol.1 , Issue.20 , pp. 79-98
    • D'arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 28
    • 55249087535 scopus 로고
    • Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
    • Davis, F. D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly (13) 3, pp. 319-338.
    • (1989) MIS Quarterly , vol.3 , Issue.13 , pp. 319-338
    • Davis, F.D.1
  • 29
    • 84936823933 scopus 로고
    • User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
    • Davis, F. D., R. P. Bagozzi, and P. R. Warshaw (1989) User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science (35) 8, pp. 982-1003.
    • (1989) Management Science , vol.8 , Issue.35 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 30
    • 85080724618 scopus 로고    scopus 로고
    • US Census Bureau
    • Day, J. C., A. Janus, and J. Davis. (2005) Computer and Internet Use in the United States: 2003. US Census Bureau.
    • (2005) And
    • Day, J.C.1    Janus, A.2
  • 31
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. and J. Backhouse (2000) Information system security management in the new millennium, Communications of the ACM (43) 7, pp. 125-128.
    • (2000) Communications of The ACM , vol.7 , Issue.43 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 32
    • 0001285417 scopus 로고
    • A cybernetic theory of stress, coping, and well-being in organizations
    • Edwards, J. (1992) A cybernetic theory of stress, coping, and well-being in organizations, Academy of Management Review (17) 2, pp. 238-274.
    • (1992) Academy of Management Review , vol.2 , Issue.17 , pp. 238-274
    • Edwards, J.1
  • 33
    • 0003551671 scopus 로고
    • Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
    • MA: Addison-Wesley
    • Fishbein, M. and I. Ajzen (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
    • (1975) Reading
    • Fishbein, M.1    Ajzen, I.2
  • 34
    • 0000356178 scopus 로고
    • Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory
    • Fornell, C. and F. L. Bookstein (1982) Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory, Journal of Marketing Research 19pp. 440-452.
    • (1982) Journal of Marketing Research , Issue.19 , pp. 440-452
    • Fornell, C.1    Bookstein, F.L.2
  • 35
    • 0000009769 scopus 로고
    • Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
    • Fornell, C. and D. F. Larcker (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research (18) 1, pp. 39-50.
    • (1981) Journal of Marketing Research , vol.1 , Issue.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 36
    • 0002464435 scopus 로고
    • vol. XIVComplete psychological works of Sigmund Freud, London: Hogarth
    • Freud, S. (1915) Repression, in, vol. XIVComplete psychological works of Sigmund Freud, London: Hogarth.
    • (1915) Repression
    • Freud, S.1
  • 37
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modeling and regression: Guidelines for research practice
    • Gefen, D., D. Straub, and M. Boudreau (2000) Structural equation modeling and regression: guidelines for research practice, Communications of the AIS (4) 7.
    • (2000) Communications of The AIS , Issue.4 , pp. 7
    • Gefen, D.1    Straub, D.2    Boudreau, M.3
  • 39
    • 0002812554 scopus 로고
    • Trust and the virtual organization
    • Handy, C. (1995) Trust and the virtual organization, Harvard Business Review (73) 3, pp. 40-50.
    • (1995) Harvard Business Review , vol.3 , Issue.73 , pp. 40-50
    • Handy, C.1
  • 41
    • 0021397380 scopus 로고
    • The health belief model: A decade later
    • Janz, N. K. and M. H. Becker (1984) The health belief model: a decade later, Health Education Quarterly (11) 1, pp. 1-45.
    • (1984) Health Education Quarterly , vol.1 , Issue.11 , pp. 1-45
    • Janz, N.K.1    Becker, M.H.2
  • 45
    • 33847761422 scopus 로고    scopus 로고
    • Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
    • Liang, H., N. Saraf, Q. Hu, and Y. Xue (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management, MIS Quarterly, 31(1), 59-7.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 59-57
    • Liang, H.1    Saraf, N.2    Hu, Q.3    Xue, Y.4
  • 46
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • Liang, H. and Y. Xue (2009) Avoidance of information technology threats: A theoretical perspective, MIS Quarterly (33) 1, pp. 71-90.
    • (2009) MIS Quarterly , vol.1 , Issue.33 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 47
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., H. H. Carr, and M. E. Warkentin (1992) Threats to information systems: Today's reality, yesterday's understanding, MIS Quarterly (16) 2, pp. 173-186.
    • (1992) MIS Quarterly , vol.2 , Issue.16 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 48
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • Maddus, J. E. and R. W. Rogers (1983) Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change, Journal of Experimental Social Psychology (19), pp. 469-479.
    • (1983) Journal of Experimental Social Psychology , Issue.19 , pp. 469-479
    • Maddus, J.E.1    Rogers, R.W.2
  • 49
    • 58149425798 scopus 로고
    • A Theory of Human Motivation
    • Maslow, A. H. (1943) A Theory of Human Motivation, Psychological Review (50) 4, pp. 370-396.
    • (1943) Psychological Review , vol.4 , Issue.50 , pp. 370-396
    • Maslow, A.H.1
  • 50
    • 0036106081 scopus 로고    scopus 로고
    • Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions
    • Milne, S., S. Orbell, and P. Sheeran (2002) Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions, British Journal of Health Psychology (7), pp. 163-184.
    • (2002) British Journal of Health Psychology , Issue.7 , pp. 163-184
    • Milne, S.1    Orbell, S.2    Sheeran, P.3
  • 51
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B.-Y., A. Kankanhalli, and Y. C. Xu (2009) Studying users' computer security behavior: A health belief perspective, Decision Support System (46) 4, pp. 815-825.
    • (2009) Decision Support System , vol.4 , Issue.46 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 52
    • 0003528130 scopus 로고
    • 2nd edition. New York: McGraw-Hill
    • Nunnally, J. (1978) Psychometric theory, 2nd edition. New York: McGraw-Hill.
    • (1978) Psychometric Theory
    • Nunnally, J.1
  • 53
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology (88) 5, pp. 879-903.
    • (2003) Journal of Applied Psychology , vol.5 , Issue.88 , pp. 879-903
    • Podsakoff, P.M.1    Mackenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 54
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • Podsakoff, P. M. and D. W. Organ (1986) Self-reports in organizational research: problems and prospects, Journal of Management (12) 4, pp. 531-544.
    • (1986) Journal of Management , vol.4 , Issue.12 , pp. 531-544
    • Podsakoff, P.M.1    Organ, D.W.2
  • 56
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe, P. A. and R. W. Rogers (1987) Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat, Journal of Personality and Social Psychology (52) 3, pp. 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.3 , Issue.52 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 57
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. (1975) A protection motivation theory of fear appeals and attitude change, Journal of Psychology (91), pp. 93-114.
    • (1975) Journal of Psychology , Issue.91 , pp. 93-114
    • Rogers, R.W.1
  • 59
    • 84973751588 scopus 로고
    • The health belief model and preventive health behavior
    • Rosenstock, I. M. (1974) The health belief model and preventive health behavior, Health Education Monographs 2pp. 354-386.
    • (1974) Health Education Monographs , Issue.2 , pp. 354-386
    • Rosenstock, I.M.1
  • 60
    • 0034380992 scopus 로고    scopus 로고
    • Health beliefs about mental illness: An instrument development study
    • Saleeby, J. R. (2000) Health beliefs about mental illness: an instrument development study, American Journal of Health Behavior (24) 2, pp. 83-95.
    • (2000) American Journal of Health Behavior , vol.2 , Issue.24 , pp. 83-95
    • Saleeby, J.R.1
  • 61
    • 0038780931 scopus 로고    scopus 로고
    • Pandora's box: Spyware, adware, autoexecution, and NGSCB
    • Schultz, E. (2003) Pandora's box: spyware, adware, autoexecution, and NGSCB, Computer & Security (22) 5, pp. 366-367.
    • (2003) Computer & Security , vol.5 , Issue.22 , pp. 366-367
    • Schultz, E.1
  • 62
    • 0141458141 scopus 로고    scopus 로고
    • Spyware & Adware: The Risks facing Businesses
    • Shaw, G. (2003) Spyware & Adware: the Risks facing Businesses, Network Security (2003) 9, pp. 12-14.
    • (2003) Network Security (2003) , vol.9 , pp. 12-14
    • Shaw, G.1
  • 64
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • Smith, H., S. Milberg, and S. Burke (1996) Information privacy: measuring individuals' concerns about organizational practices, MIS Quarterly (20) 2, pp. 167-196.
    • (1996) MIS Quarterly , vol.2 , Issue.20 , pp. 167-196
    • Smith, H.1    Milberg, S.2    Burke, S.3
  • 66
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. and R. Welke (1998) Coping with systems risk: security planning models for management decision making, MIS Quarterly (22) 4, pp. 441-469.
    • (1998) MIS Quarterly , vol.4 , Issue.22 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 67
    • 0002735809 scopus 로고
    • The protection motivation model: A normative model of fear appeals
    • Tanner, J. F., J. B. Hunt, and D. R. Eppright (1991) The protection motivation model: a normative model of fear appeals, Journal of Marketing (55), pp. 36-45.
    • (1991) Journal of Marketing , Issue.55 , pp. 36-45
    • Tanner, J.F.1    Hunt, J.B.2    Eppright, D.R.3
  • 68
    • 0034559541 scopus 로고    scopus 로고
    • Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
    • Venkatesh, V. (2000) Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model, Information Systems Research (11) 4, pp. 342-365.
    • (2000) Information Systems Research , vol.4 , Issue.11 , pp. 342-365
    • Venkatesh, V.1
  • 69
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis (2003) User acceptance of information technology: toward a unified view, MIS Quarterly (27) 3, pp. 425-478.
    • (2003) MIS Quarterly , vol.3 , Issue.27 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 71
    • 0027633395 scopus 로고
    • Testing four competing theories of health-protective behavior
    • Weinstein, N. D. (1993) Testing four competing theories of health-protective behavior, Health Psychology (12) 4, pp. 324-333.
    • (1993) Health Psychology , vol.4 , Issue.12 , pp. 324-333
    • Weinstein, N.D.1
  • 72
    • 0033768584 scopus 로고    scopus 로고
    • Perceived probability, perceived severity, and health-protective behavior
    • Weinstein, N. D. (2000) Perceived probability, perceived severity, and health-protective behavior, Health Psychology (19) 1, pp. 65-74.
    • (2000) Health Psychology , vol.1 , Issue.19 , pp. 65-74
    • Weinstein, N.D.1
  • 73
    • 0344873690 scopus 로고    scopus 로고
    • Recent advances in causal modeling methods for organizational and management research
    • Williams, L. J., J. R. Edwards, and R. J. Vandenberg (2003) Recent advances in causal modeling methods for organizational and management research, Journal of Management (29) 6, pp. 903-936.
    • (2003) Journal of Management , vol.6 , Issue.29 , pp. 903-936
    • Williams, L.J.1    Edwards, J.R.2    Vandenberg, R.J.3
  • 74
    • 84869780575 scopus 로고    scopus 로고
    • A Protection Motivation Theory Approach to Home Wireless Security
    • Las Vegas, NV
    • Woon, I., G. W. Tan, and R. Low (2005) A Protection Motivation Theory Approach to Home Wireless Security, in International Conference on Information Systems, pp. 367-380. Las Vegas, NV.
    • (2005) International Conference On Information Systems
    • Woon, I.1    Tan, G.W.2    Low, R.3
  • 75
    • 51349158689 scopus 로고    scopus 로고
    • Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
    • Workman, M., W. H. Bommer, and D. Straub (2008) Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, Computers in Human Behavior (24) 6, pp. 2799-2816.
    • (2008) Computers In Human Behavior , vol.6 , Issue.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.